11
Matthew Brezina, Adam Smith: Presentation of organized personal and public data using communication mediums. YAHOO, James J DeCarlo, Greenberg Traurig, February 28, 2017: US09584343 (9 worldwide citation)

Systems, methods and computer program products for providing information associated with an attachment (e.g., attachment received through an instant message system, online collaboration tool, electronic message and the like). A sidebar may allow a user to view comprehensive profile and content infor ...


12
Kia Silverbrook, Paul Lapstun, Jacqueline Anne Lapstun: Method and system for banking. Silverbrook Research, July 29, 2008: US07406445 (8 worldwide citation)

Methods and systems are disclosed which relate to online banking via interface surfaces printed with information and coded data. The coded data, encoded visibly or invisibly, may be queried by an appropriate sensing device. The sensing device communicates with a computer system. Together, the interf ...


13
Kennard L Wottowa, Michael Henry, William E Storts: Account and customer creation in an on-line banking model. Accenture, Finnegan Henderson Farabow Garrett & Dunner, October 12, 2010: US07813983 (8 worldwide citation)

A system, method and article of manufacture are provided for account and customer creation in an online banking model. An application is received from a customer. The application includes information relating to the user and also documentation relating to the user. A first computer is utilized to cr ...


14
Avinash Kalgi: Hybrid applications utilizing distributed models and views apparatuses, methods and systems. Visa International Service Association, Loeb & Loeb, February 28, 2017: US09582598 (8 worldwide citation)

The Hybrid Applications Utilizing Distributed Models And Views Apparatuses, Methods And Systems (“HAP”) transform hybrid application user inputs using HAP components into web-view secured data populated application views. In some implementations, the disclosure provides a processor-implemented metho ...


15
Boesgaard, Sørensen Hans Martin: Fabrication of computer executable program files from source code. Boesgaard, Sørensen Hans Martin, INSPICOS, March 27, 2008: WO/2008/034900 (8 worldwide citation)

A method for protecting a computer program against manipulation and for shielding its communication with other programs against eavesdropping and modification is presented. The method comprises the creation of individualized program copies to different groups of users, the insertion of or the deriva ...


16
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, December 13, 2011: US08079070 (7 worldwide citation)

When a user successfully logs in to an information server such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server for additional authentication. The additional authentication can ...


17
Michael Emil Ogrinz, Evan Sachs, Stephen A Corrado, Joseph Benjamin Castinado, Matthew Hsieh: Security implementation for resource distribution. Bank of America Corporation, Michael A Springs, Moore & Van Allen PLLC, Peter B Stewart, August 22, 2017: US09743272 (6 worldwide citation)

A system for securely distributing and managing resources includes a smart device, a resource management device, and a third party system, each having communication interfaces, and memory device, and processing device. In the resource management device, the processing device is configured to: receiv ...


18
Au Kean Hoe: Method of secure payment over a network. Au Kean Hoe, WYATT David Alan, December 21, 2007: WO/2007/144708 (6 worldwide citation)

A secure transaction is carried out by a merchant application which provides details of the customer bank and the transaction amount to a host system (104) and receives a transaction identifier. The merchant provides the customer with the identifier. The customer uses the bank's online banking and e ...


19
David Britton, Ori Eisen, Raz Yalov: Variable risk engine. The 41st Parameter, Knobbe Martens Olson & Bear, September 5, 2017: US09754256 (5 worldwide citation)

The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transaction, performing the amount of real-time risk analysis based on the set amount, and performing an a ...


20
Ori Eisen: Systems and methods for detection of session tampering and fraud prevention. The 41st Parameter, Knobbe Martens Olson & Bear, September 5, 2017: US09754311 (5 worldwide citation)

The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser ...